Full metadata record
DC FieldValueLanguage
dc.contributor.authorCheng, Ray-Guangen_US
dc.contributor.authorTsai, Po-Yaoen_US
dc.contributor.authorLin, Ping-Chenen_US
dc.contributor.authorLian, Chia-Liangen_US
dc.contributor.authorLiu, Tse-Hanen_US
dc.contributor.authorChou, Hsien-Chengen_US
dc.contributor.authorTsao, Shiao-Lien_US
dc.contributor.authorYang, Shanchiehen_US
dc.date.accessioned2017-04-21T06:50:03Z-
dc.date.available2017-04-21T06:50:03Z-
dc.date.issued2013en_US
dc.identifier.isbn978-1-4799-0895-0en_US
dc.identifier.urihttp://hdl.handle.net/11536/135390-
dc.description.abstractProprietary protocols on the Internet often pose challenges for users and analysts to determine how secure the applications are or how easy private information can be accessed. This work presents a tool that processes packets generated by Skype and analyzes its proprietary implementation. The goal of the exercise is to determine how one may reverse engineer a proprietary protocol and obtain private information. The results demonstrate that a buddy-list of a target user can be obtained through the developed Skype Protocol Analyzer.en_US
dc.language.isoen_USen_US
dc.subjectPrivacyen_US
dc.subjectSkypeen_US
dc.subjectProtocolen_US
dc.titleDesign and Implementation of a Skype Protocol Analyzeren_US
dc.typeProceedings Paperen_US
dc.identifier.journal2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)en_US
dc.citation.spage375en_US
dc.citation.epage+en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000332881600049en_US
dc.citation.woscount0en_US
Appears in Collections:Conferences Paper